Powered by RND
PodcastsNewsCISO Insights: Voices in Cybersecurity

CISO Insights: Voices in Cybersecurity

CISO Marketplace
CISO Insights: Voices in Cybersecurity
Latest episode

Available Episodes

5 of 336
  • The Digital Lockdown: Australia's Teenagers Take the High Court
    Australia is implementing the world's first nationwide age restriction—commonly called a "ban"—on social media access for users under 16, with full enforcement beginning on December 10, 2025. This controversial law is facing a constitutional challenge in the High Court, led by teenagers who argue the restriction violates the implied freedom of political communication and forces platforms to deploy invasive, inaccurate age verification technologies that threaten the privacy of all Australians. We explore the government's rationale regarding mental health protection against warnings from critics that the rushed ban isolates vulnerable youth, drives them toward less regulated corners of the internet, and serves as a blueprint for global surveillance infrastructure. https://www.myprivacy.blog/breaking-high-court-challenge-threatens-australias-world-first-social-media-ban https://www.compliancehub.wiki/eu-chat-control-passes-committee-on-november-26-2025-voluntary-surveillance-mandatory-age-verification-and-the-political-deception-that-got-it-through https://www.compliancehub.wiki/european-parliament-votes-for-age-limits-on-social-media-the-push-for-real-age-verification-through-digital-wallets   Sponsors www.compliancehub.wiki www.myprivacy.blog 
    --------  
    15:31
  • The Dark Pattern Paradox: AI, Phishing, and the Convenience Trap
    The cybersecurity landscape continues to evolve, demonstrating worrying trends as rapidly advancing Generative AI capabilities enable sophisticated attacker tactics, making phishing attempts much more targeted and customized. This episode explores how pervasive digital dark patterns leverage consumer cognitive biases, tricking users into sharing personal information and navigating manipulative interfaces, like pre-selected consent checkboxes, for corporate gain. Ultimately, this manipulation sustains the "consumer privacy paradox," where individuals who intellectually value security readily compromise their data for immediate convenience or functionality.   Sponsors: www.cisomarketplace.com www.scamwatchhq.com   Merch - 25% off Black Friday securitybydesignshop.etsy.com   
    --------  
    36:38
  • ACR and Alexa: The Mandatory Surveillance of the Modern Smart Home
    Smart devices like Amazon's Alexa and modern smart TVs are perpetually monitoring domestic life, utilizing technologies such as Automatic Content Recognition (ACR) to harvest viewing habits and inadvertently recording private conversations through frequent, long-duration misactivations. These recorded interactions are sent to the cloud for training sophisticated AI systems through human review, a mandatory data collection process that companies are reinforcing by eliminating user privacy options, such as Amazon discontinuing the "Do not send voice recordings" feature. We explore how this pervasive data harvesting fuels targeted advertising and investigate the technical lengths users must go to—such as deploying network-level ad blockers like PiHole or building local, internet-free systems like Home Assistant—to regain privacy.   Sponsors: www.secureiot.house www.secureiotoffice.world www.cisomarketplace.com    Merch - 25% off Black Friday securitybydesignshop.etsy.com
    --------  
    40:33
  • Deepfakes, Donations, and Deception: The Psychology of the Cyber Con
    Threat actors are exploiting human psychology using sophisticated techniques like AI-powered deepfakes and emotional manipulation to bypass traditional security defenses. This episode explores how nonprofits and consumer organizations are increasingly targeted by highly effective scams, including CEO impersonation fraud, Business Email Compromise (BEC), and fraudulent social media donation requests. We break down the new threat landscape, highlighting why effective countermeasures require comprehensive security awareness training and strong organizational policies to combat the persuasive principles of Liking, Authority, and Scarcity.   Sponsors: www.cisomarketplace.com www.scamwatchhq.com   Merch - 25% off Black Friday securitybydesignshop.etsy.com  
    --------  
    40:50
  • The Accidental Leak: Why You're the Biggest Threat to Your Own Data
    We dive into the most financially devastating threats of 2025, revealing how ransomware, which accounted for 76% of incurred losses in one portfolio, and vendor breaches continue to drive significant financial damage. The discussion explores how AI is turbocharging social engineering and credential stuffing (which caused a 250% increase in Account Takeover attacks in 202), enabling threat actors like Scattered Spider to "log in" using valid credentials rather than breaking in. We break down critical defenses—from Multi-Factor Authentication (MFA) to tokenization—and examine how everyday human mistakes, like pasting production credentials into random online formatting tools, create massive enterprise risk.   Sponsors: www.cisomarketplace.com www.scamwatchhq.com   Merch - 25% off Black Friday securitybydesignshop.etsy.com    
    --------  
    29:01

More News podcasts

About CISO Insights: Voices in Cybersecurity

CISO Insights: The Cybersecurity Leadership PodcastWhere Security Leaders Shape Tomorrow’s DefensesJoin us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders.CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communication to threat detection, compliance, and talent development.Whether you’re a CISO, aspiring security leader, or technology executive, we equip you with the tools to thrive in a complex digital environment.Connect with us:Shop: cisomarketplace.comNews: threatwatch.newsPodcast: cisoinsights.showTools: microsec.toolsAI Resources: cybersecuritygpt.storeFollow us:TikTok @cisomarketplace - Quick insights and security tipsYouTube @cisomarketplace - In-depth discussions and CISO interviewsTiktok & Youtube: @ScamwatchHQPowered by grit, fueled by caffeine. Thanks for keeping us going!coff.ee/cisomarketplacecoindrop.to/cisomarketplace
Podcast website

Listen to CISO Insights: Voices in Cybersecurity, The Mike Hosking Breakfast and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features
Social
v8.0.4 | © 2007-2025 radio.de GmbH
Generated: 11/29/2025 - 4:33:00 PM